Re: [mailop] TLS verify=FAIL

2016-04-14 Thread Franck Martin via mailop
Client certificates in emails are not rare, even to the contrary, they are predominant. The proportion of verifiable client certificates is about the same proportion of verifiable server certificates. I think there are a few MTAs that have different config for certificate presented as a client vs

Re: [mailop] TLS verify=FAIL

2016-04-14 Thread Al Iverson
Thanks for that. :) -- Al Iverson www.aliverson.com (312)725-0130 On Thu, Apr 14, 2016 at 3:02 AM, Steve Freegard wrote: > > On 14/04/16 00:58, Al Iverson via mailop.org wrote: >> >> Boo @ designing something so that "FAIL is really nothing is to be >> concerned with." >> >> It's the kind of th

Re: [mailop] TLS verify=FAIL

2016-04-14 Thread Steve Freegard
On 14/04/16 01:19, Franck Martin via mailop wrote: Have a look at https://tools.ietf.org/html/draft-martin-authentication-results-tls-03 may be jump to the example... I did not pursue, but many MTA clients are sending the certificates, meant for receiving email to the server they are connec

Re: [mailop] TLS verify=FAIL

2016-04-14 Thread Steve Freegard
On 14/04/16 00:58, Al Iverson via mailop.org wrote: Boo @ designing something so that "FAIL is really nothing is to be concerned with." It's the kind of thing deliverability people will now be spending the rest of their lives explaining to clients that this big ole FAIL is to be ignored. Agr

Re: [mailop] TLS verify=FAIL

2016-04-13 Thread Carl Byington
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Wed, 2016-04-13 at 17:19 -0700, Franck Martin via mailop wrote: > You can verify that the certificate is trusted (based on your list of > trusted CAs), but there are no good method to do hostname > verification. May be a FCrDNS would allow you to

Re: [mailop] TLS verify=FAIL

2016-04-13 Thread Franck Martin via mailop
Have a look at https://tools.ietf.org/html/draft-martin-authentication-results-tls-03 may be jump to the example... I did not pursue, but many MTA clients are sending the certificates, meant for receiving email to the server they are connecting too. You can verify that the certificate is trusted

Re: [mailop] TLS verify=FAIL

2016-04-13 Thread Al Iverson
Boo @ designing something so that "FAIL is really nothing is to be concerned with." It's the kind of thing deliverability people will now be spending the rest of their lives explaining to clients that this big ole FAIL is to be ignored. -- Al Iverson www.aliverson.com (312)725-0130 On Wed, Apr

Re: [mailop] TLS verify=FAIL

2016-04-13 Thread Steve Freegard
Hi Robert, I'm one of the developers of Haraka. verify=FAIL simply means that the TLS certificate presented by the peer host could not be verified as trusted by a CA. In the case of an MUA (which this appears to be), it would be normal as an MUA does not usually present client TLS certificates

Re: [mailop] TLS verify=FAIL

2016-04-13 Thread Brandon Long via mailop
If the server is saying your client connection is verify=FAIL/NO, I would imagine that means either you have a client certificate that doesn't verify, or you don't have a client certificate the remote server is being pedantic about it. Brandon On Wed, Apr 13, 2016 at 2:56 PM, Robert Guthrie wrot

[mailop] TLS verify=FAIL

2016-04-13 Thread Robert Guthrie
Hello List, I wonder if someone could tell me about the verify=FAIL messages I'm seeing in email headers sent from my SMTP's. Received: from loomio.io (errbit.loomio.org [45.55.128.240]) by smtp.loomio.io (Haraka/2.8.0-alpha.7) with ESMTPSA id 632790F7-CF56-4481-ACBA-2CBACE7EB8BB.1